KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In The Wake Of A Disaster, Beware Of Charity Scams

In The Wake Of A Disaster, Beware Of Charity Scams

Wanting to give donations in the wake of a disaster is admirable. However, with so many regions of the United States having been devastated by a natural disaster in recent weeks, there are dozens of illegitimate charities out there looking to take advantage of your generosity and compassion.

0 Comments
Continue reading

Artificial Intelligence: Right For The SMB?

Artificial Intelligence: Right For The SMB?

If the results of a Google search for ‘small business technology trends’ is any indication, artificial intelligence (AI) is not something that just concerns larger businesses and enterprises. Judging by the sheer number of articles that have been produced over the last several months, it is easy to see why a user might get the impression that SMBs who are not considering (or that aren’t already) investigating possible uses of AI are detrimental to their own success.

0 Comments
Continue reading

Tip of the Week: If You Prefer Windows 8’s Start Menu, You’re In Luck!

Tip of the Week: If You Prefer Windows 8’s Start Menu, You’re In Luck!

When Windows 8 launched, users of the operating system were all up in arms because they deviated from the Start menu that we know and love, in favor of a tiled menu screen. While many people went out and found the extension that turned tiles into the classic Start menu, others got used to working with the tile menu. With the release of Windows 10, the Start menu was back as the primary interface. If you’re one of those who adapted and enjoyed the tile menu of Windows 8, we’ve got good news: The tile menu is available on Windows 10!

0 Comments
Continue reading

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

0 Comments
Continue reading

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Email Cloud Internet Privacy hackers malware Business Computing Google Network Security software Efficiency Business Ransomware Microsoft User Tips Data Backup Small Business Windows Hosted Solutions IT Support Managed IT Services Productivity IT Support Network Cloud Computing Facebook Hardware Smartphone Mobile Device Management Mobile Devices Operating System Computer Windows 10 Money IT Management Antivirus Data storage IT Services Bandwidth Upgrade Business Continuity security cameras Disaster Recovery Data Management Outsourced IT Social Media Internet of Things Business Management Gmail data breach End of Support Apple VoIP BDR Microsoft Office Outlook Android Encryption SaaS Saving Money Start Menu Automation Information Technology Alert Artificial Intelligence Networking Events Big Data Phishing Word The Internet of Things Google Wallet Apps Event Marketing Local Buzz Hard Drive BYOD security solutions communications South Dakota Windows 10 Server Firewall Unified Communications Drones YouTube Productivity History Best Practice IoT Nextiva Passwords Innovation Spam Communication Politics Managed IT Services Customer Service Search Robot IBM Smartphones App Save Money Microsoft Bookings Websites Penetration Testing Sarbanes-Oxley Act Memory Document Management communication solutions Remote Computing Patch Management Access macbook vulnerabilities Conference Cryptocurrency Email Security botnet Business Growth Running Cable Hack Network Congestion Chamber of Commerce booking process Software as a Service Virtualization Phishing Scams End User Testing identity theft Spyware Uninterrupted Power Supply Deep Learning Google Drive Dell ’s Sonicwall Global Management System News Microsoft Office 365 Cleaning DDoS attacks Hacking Cabling Event Virus IT Consultation media experience Analytics Data Protection Office Solid State Drive Project Management DDoS Telephony Password Microsoft Office 365 features Update Google Docs security precautions Mixer Law IT IT Assessment information Cache Legal Corporate Profile Vendor Management Social Managed Service Provider Gadgets VoIP Programming Flash Worker Education Rebrand Vendors Lawyers IT Strategy enterprise productivity software Cloud Backup Monitors Experience Emergency Hosted Solution Rapid City File Sharing How To Settings Web Servers WiFi Applications Community Involvement IT Solutions Administration Communications Virtual Machines Displays Local Technology Sports face Business Technology Physical Security Time Management password manager LastPass IoT Devices Wireless Technology Workers Internet 101 Workplace Tips LiFi Tips and Tricks Download Attorneys Phone System Fast food Risk Creep Sales Tax Proactive IT surveillance cameras Disaster Quick Tips Streaming Media Unified Threat Management user confidence Bluetooth Society Samsung Content Filtering Office Tips Visible Light Communication Internet Connected Devices healthcare Managed Services Hardware as a Service IT for Oil Companies Music Trend Micro Scam Windows XP Remote Monitoring AtomBombing Lunch and Learn vulnerability Laptop Safety Windows 8 Tablets Managed IT Website tool Data Recovery HaaS Risk Management Writing Compliance Google Play Store Law Enforcement appointment Business Comunications LastPass Tablet Tech Support communication device Advertising VPN Press Release Vendor Mangement Virtual Reality Kaseya Black Market Browser Virtual Desktop Office 365 Touchscreen SOX Printer Google Maps business owner Webcam Data Backup Digital Business Mangement Kaseya Connect Retail Information Security botnet attack cybersecurity camera In Internet of Things Computer Care Books Banking Motion Sickness IT Consultant Budget 3D Printing network security professionals Reading Cost Management Training Machine Learning Hiring/Firing Redundancy Playbook Bring Your Own Device Administrator Relocation Work/Life Balance Employer Employee Relationship Hacker breach methods Digital Payment base infrastructure Hacks Taxes Holiday Wi-Fi collaboration capabilities Public Cloud Automobile security solution Phone Systen Unified Threat Management Notifications Paperless Office Social Engineering Users Business Metrics Documents end-of-support date Text Messaging holiday season Rental Service Chromebook PDF Computing UTM Flexibility CrashOverride holidays Collaboration CCTV Cortana Language Threat management Reliable Computing IT service scammers Web Server Twitter Miscellaneous Distributed Denial of Service Meetings Scalability Government Mobility scams Ordinary Computers Knowledge Emails Marketing G Suite Computer Malfunction Travel Processors Tracking Employer-Employee Relationship quantum computers Tech Terms Messenger Telephone Systems Sync Supercomputer Private Cloud Microchip Health